US20070174501A1 - System and method for managing a data transfer channel between communication devices - Google Patents

System and method for managing a data transfer channel between communication devices Download PDF

Info

Publication number
US20070174501A1
US20070174501A1 US11/563,152 US56315206A US2007174501A1 US 20070174501 A1 US20070174501 A1 US 20070174501A1 US 56315206 A US56315206 A US 56315206A US 2007174501 A1 US2007174501 A1 US 2007174501A1
Authority
US
United States
Prior art keywords
data
reassembled
data transfer
communication devices
transfer channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/563,152
Inventor
Bor-Chuan Lin
Jun-Feng Wang
Cai-Yang Luo
Gao-Peng Hu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hon Hai Precision Industry Co Ltd
Original Assignee
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Precision Industry Co Ltd filed Critical Hon Hai Precision Industry Co Ltd
Assigned to HON HAI PRECISION INDUSTRY CO., LTD. reassignment HON HAI PRECISION INDUSTRY CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HU, GAO-PENG, LIN, BOR-CHUAN, LUO, CAI-YANG, WANG, Jun-feng
Publication of US20070174501A1 publication Critical patent/US20070174501A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Definitions

  • the present invention generally relates to systems and methods for managing data, and more particularly to a system and method for managing a data transfer channel between communication devices.
  • a relatively secure and simple method is to cut off data links between communication devices, so as to prevent confidential data from spreading by the Internet, and prevent an unauthorized operator from accessing the sensitive data.
  • transmitting/receiving relevant information carried by data transfer channels via the Internet is needed to a person/an enterprise in a business.
  • the secure and simple method usually shows that the loss outweighs the gain if a communication device is forbidden from connecting with another via the Internet.
  • a system for managing a data transfer channel between communication devices in accordance with a preferred embodiment includes a storage device and a data manager.
  • the storage device is configured for storing security definitions.
  • the data manager includes a monitoring module, an analyzing module, an intercepting module, a data processing module, and a data controlling module.
  • the monitoring module is configured for monitoring the data transfer channel for a data transfer.
  • the analyzing module is configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions.
  • the intercepting module is configured for intercepting data packets of the data transfer channel if the data transfer is detected.
  • the data processing module is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data.
  • the data controlling module is configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
  • a method for managing a data transfer channel between communication devices includes the steps of: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data.
  • FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices in accordance with a preferred embodiment
  • FIG. 2 is a schematic diagram of main function sub-modules of a data manager of FIG. 1 ;
  • FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices in accordance with a preferred embodiment.
  • FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices (hereinafter, “the system”) in accordance with a preferred embodiment.
  • the system typically includes a plurality of communication devices, such as a work computer 5 , and a plurality of communication devices 4 (only two shown) connected to the work computer 5 via the Internet 3 .
  • the work computer 5 may include a communication interface 1 , a managing interface 2 connected with the communication interface 1 .
  • a data transfer can be performed from one of above-mentioned communication devices such as the work computer 5 , to another of above-mentioned communication devices such as the communication devices 4 through the data transfer channel.
  • Both the work computer 5 and the communication devices 4 are configured (i.e., structured and arranged) for transmitting data carried by the data transfer channel, and the data transfer can be performed specifically between the communication interface 1 and the communication devices 4 through the data transfer channel.
  • Both the work computer 5 and the communication devices 4 can be client computers, personal digital assistants (PDAs), or the like.
  • the communication interface 1 includes a plurality of data communicating tools 10 such as, Microsoft Network Messenger (shown with MSN.exe), Microsoft Internet Explorer (shown with explorer.exe), and Lotus Notes (shown with Notes.exe), for transmitting/receiving data carried by the data transfer channel between the data communicating tools 10 and the communication devices 4 .
  • the managing interface 2 includes a storage device 22 configured for storing security definitions predefined by a person, and a data manager 20 connected with the storage device 22 , the communication interface 1 and the communication devices 4 .
  • the data manager 20 is configured for managing the data transfer channel between the communication interface 1 and the communication devices 4 by corresponding to the predefined security definitions.
  • the security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication interface 1 and the communication devices 4 .
  • FIG. 2 is a schematic diagram of main function sub-modules of the data manager 20 .
  • the data manager 20 typically includes a monitoring module 200 , an analyzing module 202 , an intercepting module 204 , a data processing module 206 , and a data controlling module 208 .
  • the monitoring module 200 is configured for monitoring the data transfer channel between the communication interface 1 and the communication devices 4 for a data transfer. It is generally known that a data transfer contained a destination address is performed when the work computer 5 is communicating with a communication device 4 .
  • the address of the data communicating tool 10 is the destination address if the data transfer is from the communication device 4 to the data communicating tool 10 through the data transfer channel. Otherwise, the address of the communication device 4 is the destination address if the data transfer is from the data communicating tool 10 to the communication device 4 through the data transfer channel.
  • the analyzing module 202 is configured for waiting for the data transfer by communicating with the monitoring module 200 , and for detecting whether reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred.
  • the intercepting module 204 is configured for intercepting data packets of the data transfer channel monitored by the monitoring module 200 , and for retrieving the predefined security definitions from the storage device 22 .
  • the data processing module 206 is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not include sensitive/confidential data.
  • the data controlling module 208 is configured for releasing the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to the communication device 4 or the data communicating tool 10 according to destination address, if the reassembled data do not include sensitive/confidential data.
  • the data controlling module 208 is further configured for preventing detected data from transferring through the monitored data transfer channel to the communication device 4 or the data communicating tool 10 , if the reassembled data include sensitive/confidential data.
  • FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices by implementing the system as described above.
  • the monitoring module 200 monitors the data transfer channel between the communication interface 1 and the communication devices 4 for a data transfer.
  • step S 22 the analyzing module 202 waits for the data transfer by communicating with the monitoring module 200 .
  • step S 24 the intercepting module 204 intercepts data packets of the monitored data transfer channel, and the data processing module 206 reassembles data packets intercepted into reassembled data.
  • step S 26 the intercepting module 204 retrieves the security definitions from the storage device 22 .
  • step S 28 the analyzing module 202 detects whether the reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred.
  • step S 30 the data processing module 206 formats the reassembled data into the intercepted data packets, and the data controlling module 208 releases the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to the communication device 4 or the data communicating tool 10 according to destination address.
  • step S 32 the data controlling module 208 prevents detected data from transferring through the monitored data transfer channel to the communication device 4 or the data communicating tool 10 .

Abstract

A method for managing a data transfer channel between communication devices includes: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data. A related system is also disclosed.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention generally relates to systems and methods for managing data, and more particularly to a system and method for managing a data transfer channel between communication devices.
  • 2. Description of Related Art
  • With the continual technology advancement of computer servers and the Internet, transmitting/receiving relevant information via the Internet has become an important task for more and more people. Usually information carried by a data transfer channel is exchanged between communication devices such as a work computer, a client computer, a personal digital assistant (PDA), and the combination thereof. However, it is not secure if the information carried by the data transfer channel includes sensitive/confidential data and is exchanged between communication devices.
  • A relatively secure and simple method is to cut off data links between communication devices, so as to prevent confidential data from spreading by the Internet, and prevent an unauthorized operator from accessing the sensitive data. However, transmitting/receiving relevant information carried by data transfer channels via the Internet is needed to a person/an enterprise in a business. The secure and simple method usually shows that the loss outweighs the gain if a communication device is forbidden from connecting with another via the Internet.
  • What is needed, therefore, is a system and method that manages a data transfer channel between communication devices, that can prevent confidential data from spreading by the Internet, and prevent an authorized operator from accessing sensitive data via the Internet.
  • SUMMARY OF THE INVENTION
  • A system for managing a data transfer channel between communication devices in accordance with a preferred embodiment includes a storage device and a data manager. The storage device is configured for storing security definitions. The data manager includes a monitoring module, an analyzing module, an intercepting module, a data processing module, and a data controlling module. The monitoring module is configured for monitoring the data transfer channel for a data transfer. The analyzing module is configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions. The intercepting module is configured for intercepting data packets of the data transfer channel if the data transfer is detected. The data processing module is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data. The data controlling module is configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
  • A method for managing a data transfer channel between communication devices in accordance with a preferred embodiment includes the steps of: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data.
  • Other advantages and novel features of the present invention will become more apparent from the following detailed description of preferred embodiments when taken in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices in accordance with a preferred embodiment;
  • FIG. 2 is a schematic diagram of main function sub-modules of a data manager of FIG. 1; and
  • FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices in accordance with a preferred embodiment.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 is a schematic diagram of a hardware configuration of a system for managing a data transfer channel between communication devices (hereinafter, “the system”) in accordance with a preferred embodiment. The system typically includes a plurality of communication devices, such as a work computer 5, and a plurality of communication devices 4 (only two shown) connected to the work computer 5 via the Internet 3. The work computer 5 may include a communication interface 1, a managing interface 2 connected with the communication interface 1. A data transfer can be performed from one of above-mentioned communication devices such as the work computer 5, to another of above-mentioned communication devices such as the communication devices 4 through the data transfer channel. Both the work computer 5 and the communication devices 4 are configured (i.e., structured and arranged) for transmitting data carried by the data transfer channel, and the data transfer can be performed specifically between the communication interface 1 and the communication devices 4 through the data transfer channel. Both the work computer 5 and the communication devices 4 can be client computers, personal digital assistants (PDAs), or the like.
  • The communication interface 1 includes a plurality of data communicating tools 10 such as, Microsoft Network Messenger (shown with MSN.exe), Microsoft Internet Explorer (shown with explorer.exe), and Lotus Notes (shown with Notes.exe), for transmitting/receiving data carried by the data transfer channel between the data communicating tools 10 and the communication devices 4. The managing interface 2 includes a storage device 22 configured for storing security definitions predefined by a person, and a data manager 20 connected with the storage device 22, the communication interface 1 and the communication devices 4. The data manager 20 is configured for managing the data transfer channel between the communication interface 1 and the communication devices 4 by corresponding to the predefined security definitions. The security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication interface 1 and the communication devices 4.
  • FIG. 2 is a schematic diagram of main function sub-modules of the data manager 20. The data manager 20 typically includes a monitoring module 200, an analyzing module 202, an intercepting module 204, a data processing module 206, and a data controlling module 208.
  • The monitoring module 200 is configured for monitoring the data transfer channel between the communication interface 1 and the communication devices 4 for a data transfer. It is generally known that a data transfer contained a destination address is performed when the work computer 5 is communicating with a communication device 4. The address of the data communicating tool 10 is the destination address if the data transfer is from the communication device 4 to the data communicating tool 10 through the data transfer channel. Otherwise, the address of the communication device 4 is the destination address if the data transfer is from the data communicating tool 10 to the communication device 4 through the data transfer channel.
  • The analyzing module 202 is configured for waiting for the data transfer by communicating with the monitoring module 200, and for detecting whether reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred.
  • The intercepting module 204 is configured for intercepting data packets of the data transfer channel monitored by the monitoring module 200, and for retrieving the predefined security definitions from the storage device 22.
  • The data processing module 206 is configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not include sensitive/confidential data.
  • The data controlling module 208 is configured for releasing the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to the communication device 4 or the data communicating tool 10 according to destination address, if the reassembled data do not include sensitive/confidential data. The data controlling module 208 is further configured for preventing detected data from transferring through the monitored data transfer channel to the communication device 4 or the data communicating tool 10, if the reassembled data include sensitive/confidential data.
  • FIG. 3 is a flowchart of a method for managing a data transfer channel between communication devices by implementing the system as described above. In step S20, The monitoring module 200 monitors the data transfer channel between the communication interface 1 and the communication devices 4 for a data transfer.
  • In step S22, the analyzing module 202 waits for the data transfer by communicating with the monitoring module 200.
  • If the data transfer is not detected by the monitoring module 200, the procedure returns to step S20 as described above. Otherwise, if the data transfer is detected, in step S24, the intercepting module 204 intercepts data packets of the monitored data transfer channel, and the data processing module 206 reassembles data packets intercepted into reassembled data.
  • In step S26, the intercepting module 204 retrieves the security definitions from the storage device 22. In step S28, the analyzing module 202 detects whether the reassembled data include sensitive/confidential data corresponding to the predefined security definitions that specifies sensitive/confidential data not permitted to be transferred.
  • If the reassembled data do not include sensitive/confidential data, in step S30, the data processing module 206 formats the reassembled data into the intercepted data packets, and the data controlling module 208 releases the intercepted data packets such that the monitored data transfer channel connection is allowed to transfer the intercepted data packets to the communication device 4 or the data communicating tool 10 according to destination address.
  • Otherwise, if the reassembled data include sensitive/confidential data, in step S32, the data controlling module 208 prevents detected data from transferring through the monitored data transfer channel to the communication device 4 or the data communicating tool 10.
  • It should be emphasized that the above-described embodiments of the preferred embodiments, particularly, any “preferred” embodiments, are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described preferred embodiment(s) without departing substantially from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of this disclosure and the above-described preferred embodiment(s) and protected by the following claims.

Claims (6)

1. A system for managing a data transfer channel between communication devices, the system comprising:
a storage device configured for storing security definitions; and
a data manager comprising:
a monitoring module configured for monitoring the data transfer channel for a data transfer;
an analyzing module configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions;
an intercepting module configured for intercepting data packets of the data transfer channel if the data transfer is detected;
a data processing module configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data; and
a data controlling module configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
2. The system as claimed in claim 1, wherein the security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication devices.
3. The system as claimed in claim 1, wherein the communication devices are selected from the group consisting of computers and personal digital assistants (PDAs).
4. A method for managing a data transfer channel between communication devices, the method comprising the steps of:
monitoring the data transfer channel for a data transfer;
intercepting data packets of the data transfer channel if the data transfer is detected;
reassembling intercepted data packets into reassembled data;
detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions;
preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and
formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data.
5. The method as claimed in claim 4, wherein the predefined security definitions are used for specifying sensitive/confidential data that is not permitted to be transferred between the communication devices.
6. The method as claimed in claim 4, wherein the communication devices are selected from the group consisting of computers and personal digital assistants (PDAs).
US11/563,152 2006-01-06 2006-11-25 System and method for managing a data transfer channel between communication devices Abandoned US20070174501A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200610032816.8 2006-01-06
CNA2006100328168A CN1996901A (en) 2006-01-06 2006-01-06 Communication monitoring system and method of the network data

Publications (1)

Publication Number Publication Date
US20070174501A1 true US20070174501A1 (en) 2007-07-26

Family

ID=38251849

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/563,152 Abandoned US20070174501A1 (en) 2006-01-06 2006-11-25 System and method for managing a data transfer channel between communication devices

Country Status (2)

Country Link
US (1) US20070174501A1 (en)
CN (1) CN1996901A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100205300A1 (en) * 2007-10-25 2010-08-12 Fujitsu Limited Routing method
US8839425B1 (en) * 2013-05-17 2014-09-16 Iboss, Inc. Destination-specific network management
US9195669B2 (en) 2014-02-26 2015-11-24 Iboss, Inc. Detecting and managing abnormal data behavior

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6765505B1 (en) * 1999-12-03 2004-07-20 Fulcrum Laboratories Ag Method for data transfer
US20040181690A1 (en) * 1999-05-06 2004-09-16 Rothermel Peter M. Managing multiple network security devices from a manager device
US20070160198A1 (en) * 2005-11-18 2007-07-12 Security First Corporation Secure data parser method and system
US7260724B1 (en) * 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7350227B2 (en) * 2005-04-26 2008-03-25 Cisco Technology, Inc. Cryptographic peer discovery, authentication, and authorization for on-path signaling
US20090044263A1 (en) * 2004-09-02 2009-02-12 International Business Machines Corporation System and Method for On-Demand Dynamic Control of Security Policies/Rules by a Client Computing Device
US20090077648A1 (en) * 2003-06-06 2009-03-19 Microsoft Corporation Method for managing network filter based policies

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040181690A1 (en) * 1999-05-06 2004-09-16 Rothermel Peter M. Managing multiple network security devices from a manager device
US7260724B1 (en) * 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US6765505B1 (en) * 1999-12-03 2004-07-20 Fulcrum Laboratories Ag Method for data transfer
US20090077648A1 (en) * 2003-06-06 2009-03-19 Microsoft Corporation Method for managing network filter based policies
US20090044263A1 (en) * 2004-09-02 2009-02-12 International Business Machines Corporation System and Method for On-Demand Dynamic Control of Security Policies/Rules by a Client Computing Device
US7350227B2 (en) * 2005-04-26 2008-03-25 Cisco Technology, Inc. Cryptographic peer discovery, authentication, and authorization for on-path signaling
US20070160198A1 (en) * 2005-11-18 2007-07-12 Security First Corporation Secure data parser method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100205300A1 (en) * 2007-10-25 2010-08-12 Fujitsu Limited Routing method
US8626915B2 (en) * 2007-10-25 2014-01-07 Fujitsu Limited Routing method
US8898248B2 (en) 2007-10-25 2014-11-25 Fujitsu Limited Routing method
US8839425B1 (en) * 2013-05-17 2014-09-16 Iboss, Inc. Destination-specific network management
US9195669B2 (en) 2014-02-26 2015-11-24 Iboss, Inc. Detecting and managing abnormal data behavior
US9794291B2 (en) 2014-02-26 2017-10-17 Iboss, Inc. Detecting and managing abnormal data behavior
US10057296B2 (en) 2014-02-26 2018-08-21 Iboss, Inc. Detecting and managing abnormal data behavior

Also Published As

Publication number Publication date
CN1996901A (en) 2007-07-11

Similar Documents

Publication Publication Date Title
US11552918B2 (en) System and method of a relay server for managing communications and notification between a mobile device and application server
US10237282B2 (en) Data leak protection
US9734308B2 (en) Privilege management and revocation
US9516062B2 (en) System and method for determining and using local reputations of users and hosts to protect information in a network environment
US8286242B2 (en) System and method for providing network security
US8407763B2 (en) Secure network interface device
US7958557B2 (en) Determining a source of malicious computer element in a computer network
US9197419B1 (en) Security system for data stored in the cloud
EP1854243B1 (en) Mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server
US11880490B2 (en) Context-based access control and revocation for data governance and loss mitigation
US20110083190A1 (en) System and method for data leakage prevention
US8990893B2 (en) Enterprise application session control and monitoring in a large distributed environment
WO2006004785A1 (en) Systems and methods for enhanced electronic asset protection
US7613828B2 (en) Store-and-forward messaging channel for occasionally connected mobile applications
US7333430B2 (en) Systems and methods for passing network traffic data
US20220131876A1 (en) Method for securely communicating email content between a sender and a recipient
US20100169484A1 (en) Unauthorized Communication Program Regulation System and Associated Program
CN103441923A (en) Method and device for transmitting safety file based on network application software
US7665136B1 (en) Method and apparatus for detecting hidden network communication channels of rootkit tools
US20070174501A1 (en) System and method for managing a data transfer channel between communication devices
KR100773416B1 (en) Method and system for controlling network traffic of p2p and instant messenger
KR100748113B1 (en) Network device for preventing leakage of secret data and method thereof
Balinsky et al. System call interception framework for data leak prevention
US20200389435A1 (en) Auditing smart bits
JP4571882B2 (en) E-mail filtering method and filtering system

Legal Events

Date Code Title Description
AS Assignment

Owner name: HON HAI PRECISION INDUSTRY CO., LTD., TAIWAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIN, BOR-CHUAN;WANG, JUN-FENG;LUO, CAI-YANG;AND OTHERS;REEL/FRAME:018550/0026

Effective date: 20061117

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION